Beware! Email attachments can make you victim of spear phishing attacks

Credit to Author: Prashant Tilekar| Date: Fri, 21 Jun 2019 09:15:28 +0000

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some…

Read more

Beware! The padlock icon and HTTPS are no more indicators of safe website

Credit to Author: Sushmita Kalashikar| Date: Fri, 14 Jun 2019 14:06:40 +0000

The evolving cyber threat landscape has taken a new leap. The recent past shows a startling rise in the number of incidences of phishing attacks, where visitors have been lured into clicking fraudulent links, under the cover of security marks like padlock icon and ‘HTTPS’. Considering the rising number of…

Read more

What makes Quick Heal’s Next Generation Suite of Features a SMART choice to protect your privacy?

Credit to Author: Sushmita Kalashikar| Date: Wed, 29 May 2019 09:18:31 +0000

The cyber threat landscape is evolving every second, with thousands of new potential threats being detected every single day. With people becoming more and more conscious about their privacy and private data, such evolving threats can have a significant impact on the personal and financial life of people. In order…

Read more

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

Credit to Author: Vallabh Chole| Date: Tue, 28 May 2019 06:01:42 +0000

In today’s world data is everything, and to store and process this large amount of data, everyone started using computing devices. So, application server’s which are used for storing this precious data on computing devices include MYSQL, MongoDB, MSSQL, etc. But unfortunately, no one is conscious about its security. In…

Read more

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Credit to Author: Ganesh Lakariya| Date: Mon, 27 May 2019 07:02:35 +0000

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an…

Read more

What is Emotet?

Credit to Author: Sushmita Kalashikar| Date: Tue, 21 May 2019 11:38:17 +0000

Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat distributor till now. It has hit many organizations very badly in 2018 with its functionalities like spamming and spreading. Further with its widespread rich/existence at many organizations, it became threat distributor. Since…

Read more